Search results

From ICO wiki
Jump to navigationJump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...ipedia.org/wiki/Cowboy_coding "kauboiarenduseks"] (''cowboy coding'') ehk "Code and fix"-lähenemiseks. * FELLER, Joseph (ed) et al. Perspectives on Free and Open Source Software. MIT Press 2005. http://www.it.uom.gr/teaching/linux/perspectives- ...
    23 KB (3,148 words) - 15:36, 3 February 2023
  • [[File:Web123.webp|300px|thumb|right|Source: https://www.singlegrain.com/web3/web-3-0/]] Information overload and filter bubble - Web 2.0 provides users with a vast source of information. However, the astroturfing of page ranks in Search engines b ...
    27 KB (4,132 words) - 17:31, 2 May 2022
  • ...ans (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad th ...has to be calculated from person's name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is ...
    25 KB (4,062 words) - 14:53, 5 April 2013
  • ...security experts have claimed to have evidence that the firm was the first source. 55 Public authorities stated that the affected institutions had difficulti ...ly identical to Stuxnet, but having a different purpose. Based on original code (Stuxnet) main function was to capture and log information, such as keystro ...
    35 KB (5,366 words) - 19:18, 2 May 2022
  • ...Raymond] and others; here the two distinct camps of Free Software and Open Source are a bit simplistically viewed as one) actually are more in semblance of t ...ly related to professional ethic). [https://www.acm.org/code-of-ethics The Code of Ethic and Professional Conduct] of the ACM could be presented as an exam ...
    15 KB (2,400 words) - 15:32, 20 October 2023
  • The promo code to get access to the courses is '''EIK2016'''. [https://wiki.itcollege.ee/index.php/Radare2 Radare 2 - An Open Source alternative to IDA] by IT ...
    12 KB (1,878 words) - 13:34, 9 July 2017
  • '''Blokeerimine(Code behind)'''<br> '''Kasutaja haldus (Code behind)'''<br> ...
    27 KB (3,800 words) - 00:09, 6 January 2013
  • ...was used by another company, so it was decided to use an easy-to-remember code “40404”<ref>http://www.140characters.com/2009/01/30/how-twitter-was-born/</ ...me so common in people’s lives that it is used as the official information source (like this article, for example), most politicians around the world use Twi ...
    34 KB (5,316 words) - 15:02, 3 May 2022
  • `Get-EventLog -LogName Application -Newest 5| select Source` `$getEvent = Get-EventLog -LogName Application -Newest 19|?{($_.Source -match "SSH") -and ($_.Message -match "user")} |fl -Property Message |out- ...
    14 KB (1,863 words) - 22:54, 17 December 2017
  • *Mängu source code asub [http://www.upload.ee/files/2911013/Zombies1.0_-_VS10___XNA_4.0.rar.ht ...
    9 KB (1,325 words) - 22:03, 5 January 2013
  • BackBox is an open source Ubuntu based Linux distribution. Its main purpose is to provide a desktop e ...esults viewer. This GUI is designed to make Nmap - Network Mapper, an open source tool for network exploration and security auditing - easy for beginners whi ...
    46 KB (7,438 words) - 00:02, 9 May 2017
  • ...as source code by Fabien Letouzey. As a result, many writers revise their code to include the latest concepts.<ref>Play Chess Vs Computer - playermultipro ...engine in many freely available chess apps on Android and iOS. The source code is written in C++, but can also be compiled to JavaScript, which allows it ...
    44 KB (6,764 words) - 21:32, 3 May 2021
  • Perform below steps to compile the Nagios from the source code: Next steps, Download latest nagios-plugins source and install using following commands: ...
    23 KB (3,421 words) - 11:09, 15 December 2016
  • ...Samuel Morse] invents the [https://en.wikipedia.org/wiki/Morse_code Morse code], the first globally used method for data transmission (telegraph in its he ...f>https://groups.google.com/group/comp.os.minix/msg/b813d52cbc5a044b?dmode=source&pli=1</ref>, later known as [https://en.wikipedia.org/wiki/Linux Linux]. ...
    44 KB (7,079 words) - 18:17, 8 September 2023
  • <li>‘Light touch’ penetration testing with open source tooling level that aim to prevent data or code within the app from being stolen ...
    41 KB (5,675 words) - 19:59, 1 May 2022
  • An optical computer mouse uses a light source, typically an LED, and a light detector, such as an array of photodiodes, t ...diary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system ca ...
    84 KB (13,424 words) - 19:50, 3 January 2018
  • Võtsime lehe Source Code lahti :Code Execution ...
    32 KB (4,934 words) - 12:25, 2 April 2012
  • ...enhance security, the Yubico OTP is offered with an optional time variant code. The YubiKey has no battery but features a built-in clock that uses the pow ...ur authentication and encryption functions on open standards and free open source software, with no hidden weaknesses. Our software is freely available on ou ...
    24 KB (3,901 words) - 13:35, 7 June 2017
  • Any open source software may be used or adapted. Android or iOS development environment. #Code documentation used (Doxygen, Javadoc etc.); ...
    16 KB (2,349 words) - 12:06, 22 April 2014
  • with an error code. | ''source='' ...
    31 KB (4,093 words) - 16:53, 24 October 2011
View ( | ) (20 | 50 | 100 | 250 | 500)